Experiences from Two Sensor Network Deployments Self-Monitoring and Self-Configuration Keys to Success

Size: px
Start display at page:

Download "Experiences from Two Sensor Network Deployments Self-Monitoring and Self-Configuration Keys to Success"

Transcription

1 Experiences from Two Sensor Network Deployments Self-Monitoring and Self-Configuration Keys to Success Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt Swedish Institute of Computer Science, Box 1263, SE Kista, Sweden Abstract. Despite sensor network protocols being self-configuring, sensor network deployments continue to fail. We report our experience from two recently deployed IP-based multi-hop sensor networks: one in-door surveillance network in a factory complex and a combined out-door and in-door surveillance network. Our experiences highlight that adaptive protocols alone are not sufficient, but that an approach to self-monitoring and self-configuration that covers more aspects than protocol adaptation is needed. Based on our experiences, we design and implement an architecture for self-monitoring of sensor nodes. We show that the self-monitoring architecture detects and prevents the problems with false alarms encountered in our deployments. The architecture also detects software bugs by monitoring actual and expected duty-cycle of key components of the sensor node. We show that the energy-monitoring architecture detects bugs that cause the radio chip to be active longer than expected. 1 Introduction Surveillance is one of the most prominent application domains for wireless sensor networks. Wireless sensor networks enable rapidly deployed surveillance applications in urban terrain. While most wireless sensor network mechanisms are self-configuring and designed to operate in changing conditions [12, 16], the characteristics of the deployment environment often cause additional and unexpected problems [8, 9, 11]. In particular, Langendoen et al. [8] point out the difficulties posed by, e.g., hardware not working as expected. To contribute to the understanding of the problems encountered in real-world sensor network deployments, we report on our experience from recent deployments of two surveillance applications: one in-door surveillance application in a factory complex, and one combined out-door and in-door surveillance network. Both applications covered a large area and therefore required multi-hop networking. Our experiences highlight that adaptive protocols alone are not sufficient, but that an approach to self-monitoring and self-configuration that covers more aspects than protocol adaptation is needed. An example where we have experienced the need for self-monitoring of sensor nodes is when the components used in low-cost sensor nodes behave differently on different nodes. In many of our experiments, radio transmissions triggered the motion detector on a subset of our nodes while other nodes did not experience this problem.

2 2 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt Motivated by the observation that self-configuration and adaptation is not sufficient to circumvent unexpected hardware and software problems, we design and implement a self-monitoring architecture for detecting hardware and software problems. Our architecture consists of pairs of probes and activators where the activators start up an activity that is suspected to trigger problems and the probes measure if sensor components react to the activator s activity. Callback functions enable a node to self-configure its handling of a detected problem. We experimentally demonstrate that our approach solves the observed problem of packet transmissions triggering the motion detector. To find software problems, we integrate Contiki s software-based on-line energy estimator [5] into the self-monitoring architecture. This allows us to detect problems such as the CPU not going into the correct low power mode, a problem previously encountered by Langendoen et al. [8]. With two examples we demonstrate the effectiveness of the self-monitoring architecture. Based on our deployment experiences, we believe this tool to be very valuable for both application developers and system developers. The rest of the paper is structured as follows. The setup and measurements for the two deployments are described in Section 2. In Section 3 we present our experiences from the deployments, including unexpected behavior. Section 4 describes our architecture for self-monitoring while the following section evaluates it. Finally, we describe related work in Section 6 and our conclusions in Section 7. 2 Deployments We have deployed two sensor network surveillance applications in two different environments. The first network was deployed indoors in a large factory complex setting with concrete floors and walls, and the second in a combined outdoor and indoor setting in an urban environment. In both experiments, we used ESB sensor nodes [14] consisting of a MSP430 microprocessor with 2kB RAM, 60kB flash, a TR MHz radio and several sensors. During the deployments, we used the ESB s motion detector (PIR) and vibration sensor. We implemented the applications on top of the Contiki operating system [4] that features the uip stack, the smallest RFC-compliant TCP/IP stack [3]. All communication uses UDP broadcast and header compression that reduces the UDP/IP header down to only six bytes: the full source IP address and UDP port, as well as a flag field that indicates whether or not the header is compressed. We used three different types of messages: Measurement messages to send sensor data to the sink, Path messages to report forwarding paths to the sink, and Alarm messages that send alarms about detected activity. We used two different protocols during the deployment. In the first experiment, we used a single-hop protocol where all nodes broadcast messages to the sink. In the second experiment, we used a multi-hop protocol where each node calculates the number of hops to the sink and transmits messages with a limit on hops to the sink. A node only forwards messages for nodes it has accepted to be relay node for. A message can take several paths to the sink and arrive multiple times. During the first deployment only a few nodes were configured to forward messages, but in the second deployment any node could configure itself to act as relay node.

3 Experiences from Two Sensor Network Deployments 3 After a sensor has triggered an alarm, an alarm message is sent towards the sink. Alarm messages are retransmitted up to three times unless the node hears an explicit acknowledgment message or overhears that another node forwards the message further. Only the latest alarm from each node is forwarded. 2.1 First Deployment: Factory Complex The first deployment of the surveillance sensor network was performed in a factory complex. The main building was about 250 meters times 25 meters in size and three floors high. Both floors and most walls were made of concrete but there were sections with office-like rooms that were separated by wooden walls. Between the bottom floor and first floor there was a smaller half-height floor. The largest distance between the sink and the most distant nodes was slightly less than 100 meters. The sensor network we deployed consisted of 25 ESB nodes running a surveillance application. All nodes were either forwarding messages to the sink or monitored their environment using the PIR sensor and the vibration detector. We made several experiments ranging from a single hop network for measuring communication quality to a multi-hop surveillance network. Single-Hop Network Experiment We made the first experiment to understand the limitations of communication range and quality in the building. All nodes communicated directly with the sink and sent measurement packets at regular intervals. Node Distance Sent Sent Reception ratio Signal strength Walls Received (meter) (expected) (actual) (percent) (avg,max) C % W % C % W % W % W % W % W % W % W % W % Table 1. Communication related measurements for the first experiment. Table 1 shows the results of the measurements. The columns from left are node id, distance from the sink in meters, number of concrete and wooden walls between node and the sink, number of messages received at the sink from the node, number of messages sent by the node (calculated on sequence number), actual number of messages sent (read from a log stored in each node), percentage of successfully delivered messages, and signal strength measured at the sink. Table 1 shows that as expected the ratio of received messages decreases with increasing distance from the sink. As full sensor coverage of the factory was not possible using a single-hop network, we performed the other experiments with multi-hop networks.

4 4 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt Multi-Hop Network Experiments After performing some experiments to understand the performance of a multi-hop sensor network with respect to communication and surveillance coverage, we performed the final experiment in the first deployment during a MOUT (Military Operation on Urban Terrain) exercise with soldiers moving up and down the stairs and running in the office complex at the top level of the building. Fig. 1. Screenshot from the final experiment in the factory deployment illustrating placement of the sensor nodes during the surveillance and the paths used to transfer messages. All levels of the factory are shown with the top level at the top of the screenshot and the basement at the bottom. The office complex is on the right side at the top level in the figure. Node 110 (see Figure 1) was the most heavily loaded forwarding node in the network. It had a direct connection to the sink and forwarded messages from other nodes during the three hour long experiment. During the experiment the sink received 604 alarms generated by node percent of these alarms were received several times due to retransmissions. Node 8 had seven paths to the sink, one direct connection with the sink, and six paths via different forwarding nodes. The sink received 1270 unique alarms from node 8 and 957 duplicates. Most of the other nodes messages multi-hopped over a few alternative paths to the sink, with similar or smaller delays than those from node 110 and 8. This indicates that the network was reliable and that most of the alarms got to the server; in many cases via several paths. With the 25 sensor nodes we achieved coverage of the most important passages of the factory complex, namely doors, stairs, and corridors. 2.2 Second Deployment: Combined in-door and out-door urban terrain The second deployment was made in an artificial town built for MOUT exercises. It consisted of a main street and a crossing with several wooden buildings on both sides

5 Experiences from Two Sensor Network Deployments 5 of the streets. At the end of the main street there were some concrete buildings. The distance between the sink and the nodes at the edge of the network was about 200 meters, making the network more than twice as long as in the first deployment. The surveillance system was improved in two important ways. First, the network was more self-configuring in that there was no need for manually configuring which role each node should have (relay node or sensor node). Each node configured itself for relaying if the connectivity to sink was above a threshold. Second, alarm messages also included path information so that information of the current configuration of the network was constantly updated as messages arrived to the sink. Even with the added path information in the alarm messages, the response times for alarms in the network were similar to the response times in the first deployment despite that the distant nodes were three or four hops away from the sink rather than two or three. Using 25 nodes we achieved fairly good sensor coverage of the most important areas. 3 Deployment Experiences When we deployed the sensor network application we did not know what to expect in terms of deployment speed, communication quality, applicability of sensors, etc. Both deployments were made in locations that were new to us. This section reports on the various experiences we made during the deployments. Network Configuration During the first deployment the configuration needed to make a node act as a relay node was done manually. This made it very important to plan the network carefully and make measurements on connectivity at different locations in order to get an adequate number of forwarding nodes. This was one of the largest problems with the first deployment. During the second deployment the network s selfconfiguration capabilities made deployment a faster and easier task. The importance of self-configuration of the network routing turned out to be higher than we expected since we suddenly needed to move together with the sink to a safer location during the second deployment, where we did not risk being fired at. This happened while the network was deployed and active. Unforeseen Hardware Problems During radio transmissions a few of the sensor nodes triggered sensor readings which cause unwanted false alarms. Since we detected and understood this during the first deployment, we rewrote the application to turn off sensing on the nodes that had this behavior. Our long term solution is described in the next section. Parameter Configuration In the implementation of the communication protocols and surveillance application there are a number of parameters with static values set during early testing with small networks. Many of these parameters need to be optimized for better application performance. Due to differences in the environment, this optimization can only partly be done before deployment. Examples of such parameters are retransmission timers, alarm triggering delays, radio transmission power level, and time before refreshing a communication link.

6 6 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt Ground Truth It is important for understanding the performance of a sensor network deployment to compare the sensed data to ground truth. In our deployments, we did not have an explicit installation of a parallel monitoring system to obtain ground truth, but in both deployments we received a limited amount of parallel feedback. During the first deployment, the sensor networks alerted us of movements in various parts of the factory but since we did not have any information about the soldiers current locations it was difficult to estimate the time between detection by the sensor nodes and the alarm at the sink. Sometimes the soldiers threw grenades powerful enough to trigger the vibration sensors on the nodes. This way, we could estimate the time between the grenade explosions and the arrival of the vibration alarm at the sink. During the second deployment we received a real time feed from a wireless camera and used it to compare the soldiers path with the alarms from the sensor network. Radio Transmission During the first deployment we placed forwarding nodes in places where we expected good radio signal strength (less walls, and floors). We expected the most used path to the sink via forwarding nodes in the stairwells. However, most messages took a path straight through two concrete floors via a node placed at the ground floor below the office rooms where the sensors were deployed. Instant Feedback One important feature of the application during deployment was that when started, a node visualized its connection. When it connected, the node beeped and flashed all its leds before being silent. Without this feature we would have been calling the person at the sink all the time just to see if the node had connected to the network. This way, we could also estimate a node s link quality. The longer time for the node to connect to the network, the worse it was connected. We usually moved nodes that required more than 5-10 seconds to connect to a position with better connectivity. 4 A Self-Monitoring Architecture for Detecting Hardware and Software Problems To ensure automatic detection of the nodes that have hardware problems, we design a self-monitoring architecture that probes potential hardware problems. Our experiences show that the nodes can be categorized into two types: those with a hardware problem and those without. The self-probing mechanism could therefore possibly be run at startup, during deployment, or even prior to deployment. 4.1 Hardware Self-Test Detection of hardware problems is done using a self-test at node start-up. The goal of the self-test is to make it possible to detect if a node has any hardware problems. The self-test architecture consists of pairs of probes and activators. The activators start up an activity that is suspected to trigger problems and the probes measure if sensors or hardware components react to the activator s activity. An example of a probe/activator pair is measuring PIR interrupts when sending radio traffic. The API

7 Experiences from Two Sensor Network Deployments 7 Application Energy profile Selfmonitoring Hardware monitoring Probes Activators Software monitoring (energy profiling) Contiki OS Energy estimator Hardware Sensors Actuators Communication Fig. 2. Architecture for performing self-monitoring of both hardware and software. Self-tests of hardware are performed at startup or while running the sensor network application. Monitoring of the running software is done continuously using the built-in energy estimator in Contiki. for the callbacks from the self tester for probing for problems, executing activators and handling the results are shown in Figure 3. int probe(); void execute_activator(); void report(int activator, int probe, int percentage); Fig. 3. The hardware self-test API. With a few defined probes and activators, it is possible to call a self-test function that will run all probe/activator pairs. If a probe returns anything else than zero, this is an indication that a sensor or hardware component has reacted to the activity caused by the activator. The code in Figure 4 shows the basic algorithm for the self-test. The code assumes that the activator takes the time it needs for triggering potential problems, and the probes just read the data from the activators. This causes the self-test to monopolize the CPU, so the application can only call it when there is time for a self-test. The self-test mechanism can either be built-in into the OS or a part of the application code. For the experiments we implement a self-test component in Contiki on the ESB platform. A component on a node can break during the network s execution (we experienced complete breakdown of a node due to severe physical damage). In such case the initial self-test will not automatically detect the failure. Most sensor network applications have moments of low action, and in these cases it is possible to re-run the tests or parts of the tests to ensure that no new hardware errors have occurred.

8 8 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt /* Do a self-test for each activator */ for(i = 0; i < activator_count; i++) { /* Clear the probes before running the activator */ for(p = 0; p < probe_count; p++) { probe[p]->probe(); probe_data[p] = 0; } for(t = 0; t < TEST_COUNT; t++) { /* run the activator and probe all the probes */ activator[i]->execute_activator(); for(p = 0; p < probe_count; p++) probe_data[p] += probe[p]->probe()? 1 : 0; } /* send a report on the results for this activator-probe pair */ for(p = 0; p < probe_count; p++) report(i, p, (100 * probe_data[p]) / TEST_COUNT); } Fig. 4. Basic self-test algorithm expressed in C-code. 4.2 Software Self-Monitoring Monitoring the hardware for failure is taking care of some of the potential problem in a sensor network node. Some bugs in the software can also cause unexpected problems, such as the inability to put the CPU into low power mode [8]. This can be monitored using Contiki s energy estimator [5] combined with energy profiles described by the application developer. ENERGY_PROFILE(60 * CLOCK_SECOND, /* Check profile every 60 seconds */ energy_profile_warning, /* Call this function if mismatch */ EP(CPU, 0, 20), /* CPU 0%-20% duty cycle */ EP(TRANSMIT, 0, 20), /* Transmit 0%-20% duty cycle */ EP(LISTEN, 0, 10)); /* Listen 0%-10% duty cycle */ Fig. 5. An energy profile for an application with a maximum CPU duty cycle of 20 percent and a listen duty cycle between 0 and 10 percent. The profile is checked every 60 seconds. Each time the system deviates from the profile, a call to the function energy profile warning is made. 4.3 Self-Configuration Based on the information collected from the hardware and software monitoring the application and the operating system can re-configure to adapt to problems. In the case of the surveillance application described above the application can turn off the PIR sensor during radio transmissions if a PIR hardware problem is detected. 5 Evaluation We evaluate the self-monitoring architecture by performing controlled experiments with nodes that have hardware defects and nodes without defects. We also introduce arti-

9 Experiences from Two Sensor Network Deployments 9 ficial bugs into our software that demonstrate the effectiveness of our software selfmonitoring approach. 5.1 Detection of Hardware Problems For the evaluation of the hardware self-testing we use one probe measuring PIR interrupts, and activators for sending data over radio, sending over RS232, blinking leds and beeping the beeper. The probes and activators are used to run the tests on ten ESB nodes of which two are having the hardware problems. A complete but simplified set of probes, activators and report functions is shown in Figure 6. In this case, the results are only printed instead of used for deciding how the specific node should be configured. /* A basic PIR sensor probe */ static int probe_pir(void) { static unsigned int lastpir; unsigned int value = lastpir; lastpir = (unsigned int) pir_sensor.value(0); return lastpir - value; } /* A basic activator for sending data over radio */ static void activator_send(void) { /* send packet */ rimebuf_copyfrom(packet_data, sizeof(packet_data)); abc_send(&abc); } /* Print out the report */ static void report(int activator, int probe, int trigged_percent) { printf("activator %u Probe %u: %u%%\n", activator, probe, trigged_percent); } Fig. 6. A complete set of callback functions for a self test of radio triggered PIR sensor. As experienced in our two deployments, the PIR sensor triggers when transmitting data over the radio during the tests on a problem node. On other nodes the PIR sensors remain untriggered. Designing efficient activators and probes is important for the selfmonitoring system. Figure 7 illustrates the variations in detection ratio when varying the number of transmitted packets and packet sizes during execution of the activator. Based on these results a good activator for the radio seems to be sending three 50 bytes packets. 5.2 Detection of Software and Configuration Problems Some of the problems encountered during development and deployment of sensor network software are related to minor software bugs and misconfigurations that decrease the lifetime of the network [8]. Bugs such as missing to power down a sensor or the radio chip when going into sleep mode, or a missed frequency divisor and therefore higher sample rate in an interrupt driven A/D based sensor can decrease the network s

10 10 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt 100 Detection of hardware problems 80 one packet two packets three packets Packet size (bytes) Fig. 7. Results of varying the activator for sending radio packets on a problem node. Sending only one packet does not trigger the PIR probe, while sending three packets with a packet size larger than 50 bytes always triggers the problem. On a good node no PIR triggerings occur. expected lifetime. We explicitly create two software problems causing this type of behavior. The first problem consists of failing to turn off the radio in some situations. Figure 8 shows the duty cycle of the radio for an application that periodically sends data. XMAC [1] is used as MAC protocol to save energy. XMAC periodically turns on the radio to listen for transmissions and when sending it sends several packet preambles to wake up listeners. Using the profile from Figure 5 a warning is issued when the radio listen duty cycle drastically increases due to the software problem being triggered. In the second problem the sound sensor is misconfigured causing the A/D converter to run at twice the desired sample rate. The node then consumes almost 50% more CPU time than normal. This misbehavior is also detected by the software self-monitoring component. 6 Related Work During recent years several wireless sensor networks have been deployed the most prominent being probably the one on Great Duck Island [9]. Other efforts include glacier [11] and water quality monitoring [2]. For an overview on wireless sensor network deployments, see Römer and Mattern [13]. Despite efforts to increase adaptiveness and self-configuration in wireless sensor networks [10, 12, 16], sensor network deployments still encounter severe problems: Werner-Allen et al. have deployed a sensor network to monitor a volcano in South America [15]. They encountered several bugs in TinyOS after the deployment. For example, one bug caused a three day outage of the entire network, other bugs made nodes lose time synchronization. We have already mentioned the project by Langendoen that encountered severe problems [8]. Further examples include a surveillance application called A line in the sand [6] where some nodes would detect false events exhausting

11 Duty cycle (percent) Experiences from Two Sensor Network Deployments 11 Profiling of transmit and listen duty cycle (xmac) Profile warning Transmit Listen Listen (internal) Time (seconds) Fig. 8. Duty-cycle for listen and transmit. The left part shows the application s normal behavior with a low duty cycle on both listen and transmit. The right part shows the behavior after triggering a bug that causes the radio chip to remain active. The dashed line shows the listen duty cycle estimated using the same mechanism as the energy profiler but sampled more often. The next time the energy profile is checked the deviation is detected and a warning issued. their batteries early and Lakshman et al. s network that included nodes with a hardware problem that caused highly spatially correlated failures [7]. Our work has revealed additional insights such as a subset of nodes having a specific hardware problem where packet transmissions triggered the motion detector. 7 Conclusions In this paper we have reported results and experiences from two sensor network surveillance deployments. Based on our experiences we have designed, implemented and evaluated an architecture for detecting both hardware and software problems. The evaluation demonstrates that our architecture detects and handles hardware problems we experienced and software problems experienced during deployments of other researchers. Acknowledgments This work was funded by the Swedish Defence Materiel Administration and the Swedish Agency for Innovation Systems, VINNOVA. References 1. Michael Buettner, Gary V. Yee, Eric Anderson, and Richard Han. X-mac: a short preamble mac protocol for duty-cycled wireless sensor networks. In ACM SenSys, November 2006.

12 12 Niclas Finne, Joakim Eriksson, Adam Dunkels, Thiemo Voigt 2. T.L. Dinh, W. Hu, P. Sikka, P. Corke, L. Overs, and S. Brosnan. Design and Deployment of a Remote Robust Sensor Network: Experiences from an Outdoor Water Quality Monitoring Network. IEEE Congf. on Local Computer Networks, pages , A. Dunkels. Full TCP/IP for 8-bit architectures. In Proceedings of The First International Conference on Mobile Systems, Applications, and Services (MOBISYS 03), San Francisco, California, May A. Dunkels, B. Grönvall, and T. Voigt. Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the First IEEE Workshop on Embedded Networked Sensors (IEEE Emnets 04), Tampa, Florida, USA, November Adam Dunkels, Fredrik Österlind, Nicolas Tsiftes, and Zhitao He. Software-based on-line energy estimation for sensor nodes. In EmNets 07: Proceedings of the 4th workshop on Embedded networked sensors, pages 28 32, Anish Arora et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking. Computer Networks, 46(5): , L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Kushalnagar, L. Nachman, and M. Yarvis. Design and deployment of industrial sensor networks: experiences from a semiconductor plant in the north sea. In ACM SenSys, pages 64 75, K.G. Langendoen, A. Baggio, and O.W. Visser. Murphy loves potatoes: Experiences from a pilot sensor network deployment in precision agriculture. In 14th Int. Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), apr A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson. Wireless sensor networks for habitat monitoring. In First ACM Workshop on Wireless Sensor Networks and Applications (WSNA 2002), Atlanta, GA, USA, September PJ Marron, A. Lachenmann, D. Minder, J. Hahner, R. Sauter, and K. Rothermel. TinyCubus: a flexible and adaptive framework sensor networks. EWSN P. Padhy, K. K. Martinez, A. Riddoch, H. Ong, and J. Hart. Glacial environment monitoring using sensor networks. In Proc. of the Workshop on Real-World Wireless Sensor Networks (REALWSN 05), Stockholm, Sweden, June I. Rhee, A. Warrier, M. Aia, and J. Min. Z-MAC: a hybrid MAC for wireless sensor networks. ACM SenSys, pages , K. Römer and F. Mattern. The design space of wireless sensor networks. IEEE Wireless Communications, 11(6):54 61, December J. Schiller, H. Ritter, A. Liers, and T. Voigt. Scatterweb - low power nodes and energy aware routing. In Proceedings of Hawaii International Conference on System Sciences, Hawaii, USA, January Geoff Werner-Allen, Konrad Lorincz, Jeff Johnson, Jonathan Lees, and Matt Welsh. Fidelity and yield in a volcano monitoring sensor network. In Symposium on Operating Systems Design and Implementation (OSDI), Seattle, USA, A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. ACM SenSys, pages 14 27, 2003.

Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks

Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks Fence Monitoring Experimental Evaluation of a Use Case for Wireless Sensor Networks Georg Wittenburg, Kirsten Terfloth, Freddy López Villafuerte, Tomasz Naumowicz, Hartmut Ritter, and Jochen Schiller Freie

More information

Contiki Programming Course: Hands-On Session Notes

Contiki Programming Course: Hands-On Session Notes Contiki Programming Course: Hands-On Session Notes 1 Introduction Adam Dunkels, Fredrik Österlind adam@sics.se, fros@sics.se Swedish Institute of Computer Science October 2008 Welcome to this Contiki course

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

An integrated approach to developing sensor network solutions

An integrated approach to developing sensor network solutions An integrated approach to developing sensor network solutions Adam Dunkels Laura Marie Feeney Björn Grönvall Thiemo Voigt Computer and Network Architecture Laboratory Swedish Institute of Computer Science

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

Connecting Wireless Sensornets with TCP/IP Networks

Connecting Wireless Sensornets with TCP/IP Networks Connecting Wireless Sensornets with TCP/IP Networks Adam Dunkels 1,2, Juan Alonso 1, Thiemo Voigt 1, Hartmut Ritter 3, Jochen Schiller 3 1 Swedish Institute of Computer Science, Box 1263, SE-164 29 Kista,

More information

Using Protothreads for Sensor Node Programming

Using Protothreads for Sensor Node Programming Using Protothreads for Sensor Node Programming Adam Dunkels Swedish Institute of Computer Science adam@sics.se Oliver Schmidt oliver@jantzerschmidt.de Thiemo Voigt Swedish Institute of Computer Science

More information

The Politecast Communication Primitive for Low-Power Wireless

The Politecast Communication Primitive for Low-Power Wireless The Communication Primitive for Low-Power Wireless Marcus Lundén and Adam Dunkels Swedish Institute of Computer Science Kista, Sweden {mlunden, adam}@sics.se ABSTRACT In low-power wireless networks, nodes

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

THE INTEL MOTE PLATFORM: A BLUETOOTH * -BASED SENSOR NETWORK FOR INDUSTRIAL MONITORING

THE INTEL MOTE PLATFORM: A BLUETOOTH * -BASED SENSOR NETWORK FOR INDUSTRIAL MONITORING THE INTEL MOTE PLATFORM: A BLUETOOTH * -BASED SENSOR NETWORK FOR INDUSTRIAL MONITORING Lama Nachman, Ralph Kling, Robert Adler, Jonathan Huang, Vincent Hummel Corporate Technology Group Intel Corporation

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Environmental Monitoring Using Sensor Networks

Environmental Monitoring Using Sensor Networks Environmental Monitoring Using Sensor Networks... 2. Dezember 2010 Communication Systems Seminar HS10 Prof. Dr. Burkhard Stiller Institut für Informatik Universität Zürich Overview From Environmental Monitoring

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Secure data aggregation in mobile sink wireless sensor networks

Secure data aggregation in mobile sink wireless sensor networks Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2927-2933 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Secure data aggregation in mobile sink wireless

More information

How To Create A Time Synchronization Protocol With Low Latency Data Collection

How To Create A Time Synchronization Protocol With Low Latency Data Collection Time Synchronization for Predictable and Secure Data Collection in Wireless Sensor Networks Shujuan Chen, Adam Dunkels, Fredrik Österlind, Thiemo Voigt Swedish Institute of Computer Science {shujuan,adam,fros,thiemo}@sics.se

More information

Data Management in Sensor Networks

Data Management in Sensor Networks Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management

More information

Using IPv6 and 6LoWPAN for Home Automation Networks

Using IPv6 and 6LoWPAN for Home Automation Networks Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

CDMA-based network video surveillance System Solutions

CDMA-based network video surveillance System Solutions 1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to

More information

Low Power Memory Efficient Contiki Operating System for Wireless Sensor Networks Based Internet of Things

Low Power Memory Efficient Contiki Operating System for Wireless Sensor Networks Based Internet of Things Low Power Memory Efficient Contiki Operating System for Wireless Sensor Networks Based Internet of Things Harsh Gupta 1, Neenu Preetam. I 2 1,2 M. Tech. (Microelectronics), Department of ECE, SEEC, Manipal

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

AIR POLLUTION MONITORING SYSTEM BASED ON GEOSENSOR NETWORK 1. Young Jin Jung*, Yang Koo Lee**, Dong Gyu Lee**, Keun Ho Ryu**, Silvia Nittel*

AIR POLLUTION MONITORING SYSTEM BASED ON GEOSENSOR NETWORK 1. Young Jin Jung*, Yang Koo Lee**, Dong Gyu Lee**, Keun Ho Ryu**, Silvia Nittel* AIR POLLUTION MONITORING SYSTEM BASED ON GEOSENSOR NETWORK 1 Young Jin Jung*, Yang Koo Lee**, Dong Gyu Lee**, Keun Ho Ryu**, Silvia Nittel* Spatial Information and Engineering, University of Maine, USA*

More information

Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer.

Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer. Innovative GSM & WIFI dual network operating platform. On WIFI network, the alarm system will work without any fee. If no WIFI, it will work on GSM automatically. With state-of-the-art WIFI network technology,

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

NanoMon: An Adaptable Sensor Network Monitoring Software

NanoMon: An Adaptable Sensor Network Monitoring Software NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong

More information

An Intelligent Car Park Management System based on Wireless Sensor Networks

An Intelligent Car Park Management System based on Wireless Sensor Networks An Intelligent Car Park Management System based on Wireless Sensor Networks Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao Internet and Mobile Computing Lab Department of Computing, The Hong Kong Polytechnic

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Towards TCP/IP for Wireless Sensor Networks

Towards TCP/IP for Wireless Sensor Networks Mälardalen University Licentiate Thesis No.45 Towards TCP/IP for Wireless Sensor Networks Adam Dunkels March 2005 Swedish Institute of Computer Science Stockholm, Sweden Department of Computer Science

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo

More information

Flexible Online Energy Accounting in TinyOS

Flexible Online Energy Accounting in TinyOS Flexible Online Energy Accounting in TinyOS Simon Kellner System Architecture Group Karlsruhe Institute of Technology kellner@kit.edu Abstract. Energy is the most limiting resource in sensor networks.

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Power & Environmental Monitoring

Power & Environmental Monitoring Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for

More information

TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks

TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks Bruno T. de Oliveira 1, Cíntia B. Margi 1 1 Escola Politécnica Universidade de São Paulo Departamento de Engenharia de Computação e

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

An Emergency Medical Service in IPv6 Network Environment

An Emergency Medical Service in IPv6 Network Environment An Emergency Medical Service in IPv6 Network Environment Tseng-Yi Chen 1, Hsin-Wen Wei 2, Ying-Jie Chen 1, Wei-Kuan Shih 1 1 Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Presentation and analysis of a new technology for low-power wireless sensor network

Presentation and analysis of a new technology for low-power wireless sensor network Presentation and analysis of a new technology for low-power wireless sensor network Sabri Khssibi*, Hanen Idoudi**, Adrien Van Den Bossche*, Thierry Val* and Leila Azzouz Saidane** *University of Toulouse,

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS

AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS THU-THUY DO, DAEYOUNG KIM, TOMAS SANCHEZ LOPEZ, HYUNHAK KIM, SEONGKI HONG, MINH-LONG PHAM Information and Communications University, 119 Munjiro,

More information

Short Preambles with time left to Data

Short Preambles with time left to Data In: Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), Athens, Greece, 3-7 September 2007 A WIRELESS SENSOR MAC PROTOCOL FOR BURSTY

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

KonTest: A Wireless Sensor Network Testbed at Vrije Universiteit Amsterdam

KonTest: A Wireless Sensor Network Testbed at Vrije Universiteit Amsterdam KonTest: A Wireless Sensor Network Testbed at Vrije Universiteit Amsterdam Konrad Iwanicki, Albana Gaba, and Maarten van Steen Vrije Universiteit, Amsterdam, The Netherlands Development Laboratories (DevLab),

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Quick start: Panic Watch EU

Quick start: Panic Watch EU Quick start: Panic Watch EU Technical specs Normal operating voltage Frequency range Wireless Range 1x CR2032 3V battery 868.42 MHz Min 150 meters in a mesh network Basic operations - The Panic Watch can

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications Nithya Ramanathan, Mark Yarvis, Jasmeet Chhabra, Nandakishore Kushalnagar, Lakshman Krishnamurthy, Deborah Estrin

More information

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM

INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM Revised: August 28, 2014 PRODUCT REFERENCE MOUNTING ACCESSORIES PIR / MOTION DETECTION UNIT MAIN UNIT POWER ADAPTER MOUNTING ACCESSORIES

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...

More information

Early Warning Fire Detection and Integrated Security Solution. System Overview

Early Warning Fire Detection and Integrated Security Solution. System Overview Early Warning Fire Detection and Integrated Security Solution System Overview The FirePosse Early Warning Fire Detection and Integrated Security System from Firebreak Canada Corp. represents a major advance

More information

Home alarm system. User s manual. Profile To better understand this product, please read the user s manual carefully before using.

Home alarm system. User s manual. Profile To better understand this product, please read the user s manual carefully before using. Home alarm system User s manual Profile To better understand this product, please read the user s manual carefully before using. Features; 1. 1-99 LED wireless defense zone, with digital number to show

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems

SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems SNMP Web card User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Features... 3 1.3 Overlook... 3 1.4 Installation and

More information

IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011

IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 AGENDA Introduction IPv6 why do we need it? Selecting the right TCP/IP stack Case study Conclusions Page 2 Company Profile Wireless Products

More information

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY Ref: WhP_Rome_vA STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY WHITE PAPER Summary: This white paper shows how Structural Health Monitoring (SHM), helps to improve the quality in the construction

More information

DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS

DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS DESIGN ISSUES AND CLASSIFICATION OF WSNS OPERATING SYSTEMS ANIL KUMAR SHARMA 1, SURENDRA KUMAR PATEL 2, & GUPTESHWAR GUPTA 3 1&2 Department of I.T. and Computer Application, Dr. C.V.Raman University, Kota,

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Towards Lightweight Logging and Replay of Embedded, Distributed Systems

Towards Lightweight Logging and Replay of Embedded, Distributed Systems Towards Lightweight Logging and Replay of Embedded, Distributed Systems (Invited Paper) Salvatore Tomaselli and Olaf Landsiedel Computer Science and Engineering Chalmers University of Technology, Sweden

More information

Wireless Sensor Network for Performance Monitoring of Electrical Machine

Wireless Sensor Network for Performance Monitoring of Electrical Machine International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 4, No. 1, March 2015, pp. 1~5 ISSN: 2089-4864 1 Wireless Sensor Network for Performance Monitoring of Electrical Machine Priyanka

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

IP Box Camera ACM-5711. Ver. 081016. Hardware User s Manual

IP Box Camera ACM-5711. Ver. 081016. Hardware User s Manual IP Box Camera ACM-5711 Ver. 081016 Hardware User s Manual 0 0 PRECAUTIONS 1. Read these instructions All the safety and operating instructions should be read before the product is operated. 2. Heed all

More information

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet Monitoring Software RiMONITOR for RIEGL VZ-Line Laser Scanners for stand-alone monitoring applications by autonomous operation of all RIEGL VZ-Line Laser Scanners adaptable configuration of data acquisition

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

WIRELESS INSTRUMENTATION TECHNOLOGY

WIRELESS INSTRUMENTATION TECHNOLOGY BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904

More information

A Review of Security System for Smart Home Applications

A Review of Security System for Smart Home Applications Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves

More information

2MP H.264/ MPEG-4/ MJEPG

2MP H.264/ MPEG-4/ MJEPG 2-MegaPixel Outdoor 30fps 25 meter IR IPCAM T he is a high-end 2.0 MegaPixel (MP) network camera which designs for professional outdoor surveillance and security applications. This 2.0MP IP camera offers

More information

Wireless monitoring system for temperature and humidity based on ZigBee

Wireless monitoring system for temperature and humidity based on ZigBee Wireless monitoring system for temperature and humidity based on ZigBee Abstract Jianjun Chen* Shaoxing University uanpei College, Shaoxing, Zhejiang, 3000, China Received March 04, www.cmnt.lv Traditional

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

IP-Based Communications Solutions

IP-Based Communications Solutions IP-Based Communications Solutions IP-Based Communications Solutions Effective Communications Facility-Wide and Campus-Wide Leverage your network and lower your system costs Scalable, cost-effective and

More information

Image Transmission over IEEE 802.15.4 and ZigBee Networks

Image Transmission over IEEE 802.15.4 and ZigBee Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Denial of Service in Sensor Networks

Denial of Service in Sensor Networks Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application

More information

Monitoring Software using Sun Spots. Corey Andalora February 19, 2008

Monitoring Software using Sun Spots. Corey Andalora February 19, 2008 Monitoring Software using Sun Spots Corey Andalora February 19, 2008 Abstract Sun has developed small devices named Spots designed to provide developers familiar with the Java programming language a platform

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

Assignment 6: Internetworking Due October 17/18, 2012

Assignment 6: Internetworking Due October 17/18, 2012 Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet

More information

Temperature Alert. LAN-based Temperature and Humidity Data Logger

Temperature Alert. LAN-based Temperature and Humidity Data Logger Temperature Alert LAN-based Temperature and Humidity Data Logger LAN-based Temperature and Humidity Monitoring - Supports Simultaneous WiFi and Hardwired Interfaces -20 C to +60 C (-4 F to +140 F) Standard

More information